//]]>

Outlier Analysis (Record no. 21337)

000 -LEADER
fixed length control field 03560nam a22005055i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151114.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130109s2013 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781461463962
978-1-4614-6396-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D343
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.312
Edition number 23
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2013.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Aggarwal, Charu C.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Outlier Analysis
Medium [electronic resource] /
Statement of responsibility, etc by Charu C. Aggarwal.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 446 p. 49 illus., 10 illus. in color.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note An Introduction to Outlier Analysis -- Probabilistic and Statistical Models for Outlier Detection -- Linear Models for Outlier Detection -- Proximity-based Outlier Detection -- High-Dimensional Outlier Detection: The Subspace Method -- Supervised Outlier Detection -- Outlier Detection in Categorical, Text and Mixed Attribute Data -- Time Series and Multidimensional Streaming Outlier Detection -- Outlier Detection in Discrete Sequences -- Spatial Outlier Detection -- Outlier Detection in Graphs and Networks -- Applications of Outlier Analysis.
520 ## - SUMMARY, ETC.
Summary, etc With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions– the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques  commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data  domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as  credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Database management.
Topical term or geographic name as entry element Data mining.
Topical term or geographic name as entry element Information storage and retrieval systems.
Topical term or geographic name as entry element Artificial intelligence.
Topical term or geographic name as entry element Mathematical statistics.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Data Mining and Knowledge Discovery.
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
Topical term or geographic name as entry element Statistics and Computing/Statistics Programs.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Database Management.
Topical term or geographic name as entry element Information Storage and Retrieval.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781461463955
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-6396-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-09AUM Main Library2014-04-09 2014-04-09 E-Book   AUM Main Library006.312

Languages: 
English |
العربية